Sciweavers

325 search results - page 53 / 65
» COMCON: Use Cases for Virtual Future Networks
Sort
View
PERCOM
2004
ACM
14 years 8 months ago
Pervasive Authentication Domains for Automatic Pervasive Device Authorization
In a pervasive computing environment, users have many devices that are used to initiate or answer remote service requests, such as obtaining real-time stock quotes, handling corpo...
Reiner Sailer, James Giles
AIMS
2008
Springer
13 years 10 months ago
Entwined Influences of Users' Behaviour and QoS: A Multi-model Approach
In distributed, dynamic networks and applications, such as Peer-to-Peer (P2P), users'behaviour and quality of service/quality of experiment1 are known to influence each other....
Julien Siebert, Vincent Chevrier, Laurent Ciarlett...
ICWN
2009
13 years 6 months ago
On the Power Allocation of MIMO Channels
In this paper we consider MIMO system with Mt transmitting and Mr receiving antennas, when channel state information (CSI) is known on the transmitter side. The Reyleigh fading cha...
Viktor Zaharov, Houssain Kettani
FORTE
2011
13 years 9 days ago
A Framework for Verifying Data-Centric Protocols
Abstract. Data centric languages, such as recursive rule based languages, have been proposed to program distributed applications over networks. They simplify greatly the code, whic...
Yuxin Deng, Stéphane Grumbach, Jean-Fran&cc...
ISLPED
2004
ACM
137views Hardware» more  ISLPED 2004»
14 years 2 months ago
Location cache: a low-power L2 cache system
While set-associative caches incur fewer misses than directmapped caches, they typically have slower hit times and higher power consumption, when multiple tag and data banks are p...
Rui Min, Wen-Ben Jone, Yiming Hu